Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Furbach, Ulrich; Glöckner, Ingo; Pelzer, Björn
An application of automated reasoning in natural language question answeringAI Communications. Bd. 23. H. 2-3. Amsterdam: IOS Press 2010 S. 241 - 265
Zöbel, Dieter; Weyand, Christian
An Integrated Software Concept for Autonomous Driving in the Context of Intermodal Freight TrafficMichael Bauer; Jaime Lloret Mauri; Oana Dini (Hrsg). Proceedings of the Sixth International Conference on Autonomic and Autonomous Systems ICAS 2010: 7-13 March 2010; Cancun, Mexico. Los Alamitos, CA: IEEE Computer Society 2010 S. 125 - 130
Faber, Johannes; Ihlemann, Carsten; Jacobs, Swen et al.
Automatic Verification of Parametric Specifications with Complex TopologiesDominique Méry; Stephan Merz (Hrsg). Integrated Formal Methods: 8th International Conference, IFM 2010, Nancy, France, October 11-14, 2010. Proceedings. Berlin: Springer 2010 S. 152 - 167
Frey, Hannes
Best case energy analysis of localized euclidean minimum spanning tree based multicasting in ad hoc and sensor networksViolet R. Syrotiuk; Fatih Alag; Brahim Bensaou; Özgür B. Akan (Hrsg). MSWIM'10: Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems; Bodrum, Turkey; October 17–21, 2010. New York, NY: ACM Association for Computing Machinery 2010 S. 195 - 204
Kschischo, Maik
Charge Balance matters: Lessons from modelling potassium homeostasis2010
Beckers, Kristian; Hirsch, Martin; Jürjens, Jan
Compliance in Clouds: A cloud computing security perspectiveGI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26
Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors riskInternational Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37
Rybalchenko, Andrey; Sofronie-Stokkermans, Viorica
Constraint solving for interpolationJournal of Symbolic Computation. Bd. 45. H. 11. Amsterdam: Elsevier 2010 S. 1212 - 1233
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentationComputer Security Foundations Symposium (CSF). 2010
Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecRequirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93